Biometric technology

30
BIOMETRIC TECHNOLOGY

Transcript of Biometric technology

Page 1: Biometric technology

BIOMETRIC TECHNOLOGY

Page 2: Biometric technology

Objectives1) What is a Biometric ?2) Various Types of Biometric3) History of Biometric4) Working & Authentication process5) Advantages and Disadvantages6) Applications7) Conclusion

Page 3: Biometric technology

What is a Biometric ??? Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing biological traits. Unique identifiers include fingerprints, hand geometry, earlobe geometry, retina and iris patterns, voice waves, DNA, and signatures.

Page 4: Biometric technology
Page 5: Biometric technology

History of Biometric TechnologyThe term “biometrics” is derived from

the Greek words “bio” (life) and “metrics” (to measure). 

Biometric is the automated process of identifying or verifying an individual based upon his or her behavioral or physical characteristics.

1858 – First systematic capture of hand images for identification purposes is recorded by Sir William Herschel

William Herschel

1936 – Concept of using the iris pattern for identification is proposed

frank burch

Page 6: Biometric technology

What is Authentication ???Authentication is the act of

confirming something what it claims to be.

It is the process of giving someone identity so that he or she can access that particular application or data.

For e.g.: giving identity-card to a student of an institute.

Authentication

Page 7: Biometric technology

Main Types of AuthenticationBy using passwords, PIN

By using smart card or swipe card

By using Biometric

Page 8: Biometric technology

Mode of Biometric SystemIdentification One-to-many comparison It search for a sample against a database of

templates It identifies an unknown individual. For e.g.: who is “x”?

Verification One-to-one comparison It compares a sample against a single stored

template It verifies that the individual is who he claims to be For e.g.: is this “x”?

Page 9: Biometric technology

Working of biometric systemSteps:CapturingPre-processingFeature extractionTemplate matchingMatcher/ComparisonApplication Device

Page 10: Biometric technology

Working processEnrollment: In this stage, the information

captured from the subject by the sensing device is stored in a database for later comparison. When someone uses biometric for the first time then the stage is called enrollment.

Page 11: Biometric technology

Contd…Authentication: In this stage, the

registered biometric sample during the enrollment process are matched against newly capturing biometric sample.

Page 12: Biometric technology

Biometric devices consist ofA scanning device

A software which converts scanned information into digital forms and compares on some matching points

A database that stores biometric features for further comparison

Page 13: Biometric technology

Different biometric techniqueFingerprint technology: It is the oldest and most widely used method.It needs a fingerprint reader.Registered points are located and compared.Optical sensors are used for scanning purpose.It can be used for many applications like pc login

security, voting system, attendance system etc.

Page 14: Biometric technology

Contd..Uses the ridge endings and bifurcation's on a

persons finger to plot points known as MinutiaeThe number and locations of the minutiae vary

from finger to finger in any particular person, and from person to person for any particular finger

Finger Image + MinutiaeFinger Image Minutiae

Page 15: Biometric technology

Face recognition technology Face Recognition is a biometric technique for

automatic identification or verification of a person from a digital image.

These include the position/size/shape of the eyes, nose, cheekbones and jaw line.

Page 16: Biometric technology

Facial Recognition1. Capture image

2. Find face in image

3. Extract features (store template)

4. Compare templates

5. Declare matches

Page 17: Biometric technology

Iris Recognition TechnologyIt measures the iris pattern of the eye i.e.

the colored part of the eye that surrounds the pupil.

The iris canner analyzes features like rings, furrows, and freckles existing in the colored tissue surrounding the pupil.

Iris pattern is not changed over years or by glasses, contact lens

Page 18: Biometric technology

Iris recognitionIris scanning measures the iris pattern in the colored part of the eye,

Page 19: Biometric technology

Retina recognition

Images back of the eye and compares blood vessels with existing data

Page 20: Biometric technology

Hand Geometry TechnologyThis method uses hand images for

person identification or verification.Person identification using hand

geometry utilizes hand images to extract a number of features such as finger length, width, thickness, finger area etc.

Measures the digits of the hand and compares to those collected at the time of enrollment.

Page 21: Biometric technology

Contd..Places hand on the system, which

takes the three dimensional image of the hand.

Page 22: Biometric technology

Speaker recognition technologyVoice Recognition or Speaker Recognition is a

biometric process of validating a user's claimed identity using characteristics extracted from their voices.

It uses the pitch, pattern, tone, frequency, rhythm of speech for identification purposes.

A telephone or microphone can act as a sensor.

Page 23: Biometric technology

Contd.. During the enrollment phase, the spoken words are

converted from analog to digital format, and the distinctive vocal characteristics such as pitch, frequency, and tone, are extracted, and a speaker model is established.

A template is then generated and stored for future comparisons.

Speaker recognition is often used where voice is the only available biometric identifier, such as telephone.

Page 24: Biometric technology

Keystroke dynamicsKeystroke dynamics is an automated method of examining an individual’s keystrokes on a keyboard.

This technology examines such dynamicsas speed and pressure, the total time taken to type particular words, and the time elapsed between hitting certain keys.

Page 25: Biometric technology

Comparison Between Different Technique

Page 26: Biometric technology

Biometrics cannot be lost, stolen or forgotten. Barring disease or serious physical injury, the biometric is consistent and permanent.

It is also secure in that the biometric itself cannot be socially engineered, shared or used by others.

There is no requirement to remember passwords, or PINs, thus eliminating an overhead cost. The biometric is always available to the individual;

Coupled with a smart card, biometrics provide strong security for any credentials on the smart card.

Biometric system provide a high degree of confidence in user identity.

Organizations can implement recognition systems to obviate the need to log onto a system manually.

advantage of biometrics

Page 27: Biometric technology

Lack of standardizationWhile the reliability and the accuracy of biometric

devices continues to improve.Biometric systems must be able to accommodate

changes to the biometric over time which may be caused by ageing, illness or injury.

The effectiveness of the sample collection process is strongly influenced by environmental conditions, user training and usability. For example, lighting, facial orientations, expression, image resolution and the wearing of hats can affect the quality of the sample.

disadvantages

Page 28: Biometric technology

Applications of Biometricpresently using Vertical markets that are using

biometrics:Government—Passports, national

identification (ID) cards, voter cards, driver’s licenses, social services, and so on

✓ Transportation—Airport security, boarding passes, and commercial driver’s licenses

✓ Healthcare—Medical insurance cards, patient/employee identity cards

✓ Financial—Bankcards, ATM cards, credit cards, and debit cards

✓ Security—Access control and identity verifications, including time and attendance

✓ Education—Student/teacher identity verification and access control. Biometrics are now being implemented in large-scale ID systems around the globe.

Future using and existing Biometrics is a rapidly evolving

technology that is being widely used in forensics, such as criminal identification and prison security, and that has the potential to be used in a large range of civilian application areas.

Biometrics can be used to prevent unauthorized access to ATMs, cellular phones, smart cards, desktop PCs, workstations, and computer networks.

It can be used during transactions conducted by telephone and Internet (electronic commerce and electronic banking).

In automobiles, biometrics can replace keys with keyless entry devices.

Page 29: Biometric technology

conclusion

The upcoming lead in technology

Page 30: Biometric technology

Any queries